Debian DSA-789-1 : php4 - several vulnerabilities

high Nessus Plugin ID 19532

Synopsis

The remote Debian host is missing a security-related update.

Description

Several security related problems have been found in PHP4, the server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems :

- CAN-2005-1751 Eric Romang discovered insecure temporary files in the shtool utility shipped with PHP that can exploited by a local attacker to overwrite arbitrary files. Only this vulnerability affects packages in oldstable.

- CAN-2005-1921

GulfTech has discovered that PEAR XML_RPC is vulnerable to a remote PHP code execution vulnerability that may allow an attacker to compromise a vulnerable server.

- CAN-2005-2498

Stefan Esser discovered another vulnerability in the XML-RPC libraries that allows injection of arbitrary PHP code into eval() statements.

Solution

Upgrade the PHP packages.

For the old stable distribution (woody) these problems have been fixed in version 4.1.2-7.woody5.

For the stable distribution (sarge) these problems have been fixed in version 4.3.10-16.

See Also

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323366

http://www.debian.org/security/2005/dsa-789

Plugin Details

Severity: High

ID: 19532

File Name: debian_DSA-789.nasl

Version: 1.23

Type: local

Agent: unix

Published: 8/30/2005

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:3.0, p-cpe:/a:debian:debian_linux:php4, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/29/2005

Vulnerability Publication Date: 5/25/2005

Exploitable With

Metasploit (PHP XML-RPC Arbitrary Code Execution)

Reference Information

CVE: CVE-2005-1751, CVE-2005-1759, CVE-2005-1921, CVE-2005-2498

DSA: 789